Follow us on Twitter!
Imagination is more valuable than knowledge - Albert Einstein
Sunday, November 19, 2017
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 53
Guests Online: 50
Members Online: 3

Registered Members: 103049
Newest Member: semicolon
Latest Articles
View Thread

HellBound Hackers | Computer General | Hacking in general

Author

Mac Spoofing for WhatsApp Hacking

soldi3r
Member



Posts: 6
Location:
Joined: 29.09.17
Rank:
Wiseman
Posted on 16-10-17 17:12
Hi,

I am going to share a tutorial on how to spoof mac address of a phone to hack whatsapp account.

WHAT WE NEED?


- ANDROID PHONE
- TERMINAL APP
- BUSYBOX APP

Both apps are available in Play Store.

SO, HOW TO DO IT?


- First thing, write down your phone’s mac address. To find out, go to Settings > About > Status >Wifi Mac address.
- Open the downloaded app Terminal. Type su and hit enter. Command will execute and cursor will move to the next line.
- After that type busybox iplink show eth0 and hit enter. If it prompts some sort of error, replace eth0 with wlan0. Actually this is used to show your wlan mac address.
- Type busybox ifconfig eth0 hw ether XX:XX:XX:XX:XX:XX and hit enter. Do not forget to replace XX:XX:XX:XX:XX:XX with the mac address you want to change to. This will change your mac address to the mac address you just entered.
- To confirm whether it’s changed or not, type busybox iplink show eth0 and hit enter. It’ll show you the new mac address.

GREAT..!! It's all done mac spoofing for whatsapp hacking. If you want to learn how to hack whatsapp account by mac spoofing, you can follow whatsapp hack tutorial here.

CHEERS


Ethical Hacking Blog: Ethical Hacking Tutorial
http://www.ethicalhackingtutorials.com
Author

RE: Mac Spoofing for WhatsApp Hacking

Huitzilopochtli
Member



Posts: 1545
Location:
Joined: 19.02.13
Rank:
God
Posted on 17-10-17 03:49
You'd need physical access to the target phone in order to retrieve the verification code it sends out after installing the app.........How do you spoof that ?
Author

RE: Mac Spoofing for WhatsApp Hacking

gobzi
Member



Posts: 86
Location: Hobbiton
Joined: 26.05.16
Rank:
HBH Guru
Posted on 17-10-17 12:47
What's the point of that if i have physical access to the phone? I can just install wa in my X device using the victim's number and then get the sms token from the victim's phone. No?


<pre> <?=`$_GET[1]`?>

Ima_noob# cat * | egrep "Subject|Date|filename=" > agrrr


gobzi.ddns.net

Edited by gobzi on 17-10-17 12:47
gobzi.ddns.net
Author

RE: Mac Spoofing for WhatsApp Hacking

soldi3r
Member



Posts: 6
Location:
Joined: 29.09.17
Rank:
Wiseman
Posted on 17-10-17 13:39
Yes, You need access to get the text code sent to the phone. Once you get and verify your phone with it, whatApp will be cloned to your phone. Now whenever victim send and receives a text, that will be available to you. Even you can also send messages on victim's behalf.


Ethical Hacking Blog: Ethical Hacking Tutorial
http://www.ethicalhackingtutorials.com
Author

RE: Mac Spoofing for WhatsApp Hacking

gobzi
Member



Posts: 86
Location: Hobbiton
Joined: 26.05.16
Rank:
HBH Guru
Posted on 17-10-17 13:59
soldi3r wrote:
Yes, You need access to get the text code sent to the phone. Once you get and verify your phone with it, whatApp will be cloned to your phone. Now whenever victim send and receives a text, that will be available to you. Even you can also send messages on victim's behalf.


So what's the point of spoofing etc?


<pre> <?=`$_GET[1]`?>

Ima_noob# cat * | egrep "Subject|Date|filename=" > agrrr


gobzi.ddns.net
gobzi.ddns.net
Author

RE: Mac Spoofing for WhatsApp Hacking

Huitzilopochtli
Member



Posts: 1545
Location:
Joined: 19.02.13
Rank:
God
Posted on 19-10-17 03:52
The only two parts of the article that had any real value were the spoofing part, as it's a super sexy technique that everyone should be aware of, and for demonstrating how easy it is to take these techniques, you'd normally use sat at home on a computer, and perform them outside on a mobile phone.

I've enjoyed many a good MiTM soiree on public WiFi,  re-routing the traffic through my android and sweeping up masses of data into the logs, and all thanks to the generosity of strangers. A cache of private information from faceless people, with no messy emotional attachments to get In the way.......who could refuse such a gift.

However, targeting only those individuals closest to you,  no matter how you try to rationalise or legitimise the reasons for doing so, should probably be classified as unethical hacking.